Zombie Zero ups the APT ante 
By Juha Saarinen | Jul 16, 2014 | Comment Now 
[Blog post] Is your supply chain the next attack vector?
 
Whitepaper: Trend Micro's 10 step APT action plan 
Oct 16, 2013 | Comment Now 
Reconsider your current situational awareness, level of preparation and operative ability.
 
Australian orgs possibly hit in hacker-for-hire attacks 
By Darren Pauli | Sep 26, 2013 | Comment Now 
Mercenary group hits Windows, Mac with 'Icefog' backdoor.
 
Revised icode applied to mobiles 
By Brett Winterford | Jun 4, 2013 | Comment Now 
ISPs asked to cut off infected tablets, smartphones.
 
Revised icode applied to mobile devices 
By Brett Winterford | May 31, 2013 | Comment Now 
ISPs asked to cut off infected tablets, smartphones.
 
Gartner: Integrate IAM and SIEM to fight advanced threats 
 
Students turn incident responders in DSD hackathon  
By Darren Pauli | Mar 8, 2013 | Comment Now 
Cyber Security Challenge opens doorways to security careers in Telstra, Fed Govt.
 
51 critical infrastructure organisations breach in 2012: report 
 
Melbourne biz beats ransomware with backups 
By Darren Pauli | Feb 13, 2013 | Comment Now 
Air-gapped data saves small business $5000.
 
CERT Australia rebuffs ex-staff criticism 
By Darren Pauli | Feb 8, 2013 | Comment Now 
Says 'teething problems' are past.
 
Gillard unveils cyber security coordination centre 
By Darren Pauli | Jan 23, 2013 | Comment Now 
World-class facility combines departmental efforts.
 
Gillard launches cyber security centre 
By Darren Pauli | Jan 23, 2013 | Comment Now 
Defence, ASIO, and Federal Police aim for better coordination.
 
Attacks spike against Lockheed Martin 
By Dan Raywood | Nov 14, 2012 | Comment Now 
Sophisticated attacks launched.
 
Lockheed Martin suppliers targeted by cyber attackers 
By Andrea Shalal-Esa | Nov 14, 2012 | Comment Now 
Seen as more likely avenue to extract information.
 
Hikit targets US defense contractors  
By Danielle Walker | Aug 28, 2012 | Comment Now 
The advanced persistent threat malware exploits existing vulnerabilities in servers, enabling attackers to maintain access to victims' data while remaining below the radar.
 
CERT Australia polls incident response in critical infrastructure 
By Darren Pauli | Jul 20, 2012 | Comment Now 
Survey gauges how breached organisations handled attacks.
 
iCode review tackles public wifi malware 
By Darren Pauli | Jun 14, 2012 | Comment Now 
Telcos, security experts discuss anti-botnet scheme.
 
Security boffins dissect iCode's future 
By Darren Pauli | Jun 13, 2012 | Comment Now 
Metrics and malware on the agenda for Sydney review.
 
US unveils initiatives to fight botnets   
By Greg Masters | Jun 4, 2012 | Comment Now 
Industry Botnet Group spearheads work.
 
South Africa to adopt Aussie iCode this year 
By Darren Pauli | May 9, 2012 | Comment Now 
Former IIA chief expands anti-botnet initiative.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 706

Vote